Sciweavers

7167 search results - page 1390 / 1434
» Answer Set Programming
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
IPAS
2008
13 years 10 months ago
Multivariate mathematical morphology and Bayesian classifier application to colour and medical images
Multivariate images are now commonly produced in many applications. If their process is possible due to computers power and new programming languages, theoretical difficulties hav...
Arnaud Garcia, Corinne Vachier, Jean-Paul Vall&eac...
AAAI
2007
13 years 10 months ago
Automated Online Mechanism Design and Prophet Inequalities
Recent work on online auctions for digital goods has explored the role of optimal stopping theory — particularly secretary problems — in the design of approximately optimal on...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Tu...
AIPS
2008
13 years 10 months ago
Generative Planning for Hybrid Systems Based on Flow Tubes
When controlling an autonomous system, it is inefficient or sometimes impossible for the human operator to specify detailed commands. Instead, the field of AI autonomy has develop...
Hui X. Li, Brian C. Williams
WSC
2007
13 years 10 months ago
What I wish they would have taught me (or that I would have better remembered!) in school
This panel reflects upon their experiences as simulation professionals and shares their thoughts regarding elements of their simulation education that they have found most helpful...
Charles R. Standridge, Daniel A. Finke, Carley Jur...
« Prev « First page 1390 / 1434 Last » Next »